cs0605088/main.bbl
1: \begin{thebibliography}{1}
2: \providecommand{\url}[1]{#1}
3: \csname url@rmstyle\endcsname
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10:   \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20: 
21: \bibitem{deng-intrusion}
22: J.~Deng, R.~Han, and S.~Mishra, ``Intrusion tolerance and anti-traffic analysis
23:   strategies for wireless sensor networks,'' in \emph{DSN '04: Proceedings of
24:   the 2004 International Conference on Dependable Systems and Networks
25:   (DSN'04)}.\hskip 1em plus 0.5em minus 0.4em\relax Washington, DC, USA: IEEE
26:   Computer Society, 2004, p. 637.
27: 
28: \bibitem{mathewson-practical}
29: \BIBentryALTinterwordspacing
30: N.~Mathewson and R.~Dingledine, ``Practical traffic analysis: Extending and
31:   resisting statistical disclosure.'' [Online]. Available:
32:   \url{citeseer.ist.psu.edu/678780.html}
33: \BIBentrySTDinterwordspacing
34: 
35: \bibitem{newman-metrics}
36: \BIBentryALTinterwordspacing
37: R.~E. Newman, I.~S. Moskowitz, P.~Syverson, and A.~Serjantov, ``Metrics for
38:   traffic analysis prevention.'' [Online]. Available:
39:   \url{citeseer.ist.psu.edu/653919.html}
40: \BIBentrySTDinterwordspacing
41: 
42: \bibitem{syverson97anonymous}
43: \BIBentryALTinterwordspacing
44: P.~F. Syverson, D.~M. Goldschlag, and M.~G. Reed, ``Anonymous connections and
45:   onion routing,'' in \emph{{IEEE} Symposium on Security and Privacy}, Oakland,
46:   California, 4--7 1997, pp. 44--54. [Online]. Available:
47:   \url{citeseer.ist.psu.edu/syverson97anonymous.html}
48: \BIBentrySTDinterwordspacing
49: 
50: \bibitem{deng-antitrafficanalysis}
51: J.~Deng, R.~Han, and S.~Mishra, ``Countermeasures againts traffic analysis
52:   attacks in wireless sensor networks,'' in \emph{SecureComm '05: CerateNet
53:   Conference on Security and Privacy in Communication Networks (SecureComm
54:   2005)}.\hskip 1em plus 0.5em minus 0.4em\relax IEEE Computer Society, 2005,
55:   pp. 113--124.
56: 
57: \bibitem{lee-01}
58: S.~Lee and M.~Gerla, ``Split multipath routing with maximally disjoint paths in
59:   ad hoc networks,'' in \emph{Proceedings of the IEEE International Conference
60:   on Communication (ICC)}, 2001, pp. 3201--3205.
61: 
62: \bibitem{xu-01}
63: Y.~Xu, J.~Heidemann, and D.~Estrin, ``Geography-informed energy conservation
64:   for ad hoc routing,'' in \emph{MobiCom '01: Proceedings of the 7th annual
65:   international conference on Mobile computing and networking}.\hskip 1em plus
66:   0.5em minus 0.4em\relax New York, NY, USA: ACM Press, 2001, pp. 70--84.
67: 
68: \bibitem{ns2}
69: \BIBentryALTinterwordspacing
70: ``Network simulator - ns2.'' [Online]. Available:
71:   \url{http://www.isi.edu/nsnam/ns/}
72: \BIBentrySTDinterwordspacing
73: 
74: \end{thebibliography}
75: